First published: Wed May 02 2018(Updated: )
On F5 BIG-IP 13.1.0-13.1.0.5, when Large Receive Offload (LRO) and SYN cookies are enabled (default settings), undisclosed traffic patterns may cause TMM to restart.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
f5 big-ip local traffic manager | >=13.1.0<=13.1.0.5 | |
f5 big-ip application acceleration manager | >=13.1.0<=13.1.0.5 | |
F5 BIG-IP Advanced Firewall Manager | >=13.1.0<=13.1.0.5 | |
F5 BIG-IP Analytics | >=13.1.0<=13.1.0.5 | |
F5 BIG-IP Access Policy Manager | >=13.1.0<=13.1.0.5 | |
F5 BIG-IP Application Security Manager | >=13.1.0<=13.1.0.5 | |
f5 big-ip edge gateway | >=13.1.0<=13.1.0.5 | |
f5 big-ip global traffic manager | >=13.1.0<=13.1.0.5 | |
f5 big-ip link controller | >=13.1.0<=13.1.0.5 | |
f5 big-ip policy enforcement manager | >=13.1.0<=13.1.0.5 | |
f5 big-ip webaccelerator | >=13.1.0<=13.1.0.5 | |
F5 Big-ip Websafe | >=13.1.0<=13.1.0.5 | |
f5 big-ip domain name system | >=13.1.0<=13.1.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-5512 is a vulnerability found in F5 BIG-IP 13.1.0-13.1.0.5 that may cause TMM to restart when specific traffic patterns are detected.
CVE-2018-5512 affects F5 BIG-IP 13.1.0-13.1.0.5 when Large Receive Offload (LRO) and SYN cookies are enabled.
CVE-2018-5512 has a severity rating of high with a score of 7.5 out of 10.
To fix CVE-2018-5512, update your F5 BIG-IP software to version 13.1.0.6 or later.
You can find more information about CVE-2018-5512 on the following websites: [1] SecurityFocus [2] SecurityTracker [3] F5 support.